SERVICE AUTOMATION AND DYNAMIC PROVISIONING TECHNIQUES IN IP/MPLS ENVIRONMENTS
|
|
|
- Loraine Owens
- 10 years ago
- Views:
Transcription
1 SERVICE AUTOMATION AND DYNAMIC PROVISIONING TECHNIQUES IN IP/MPLS ENVIRONMENTS Christian Jacquenet, Gilles Bourdon and Mohamed Boucadair All at France Telecom, France
2
3 SERVICE AUTOMATION AND DYNAMIC PROVISIONING TECHNIQUES IN IP/MPLS ENVIRONMENTS
4 WILEY SERIES IN COMMUNICATIONS NETWORKING & DISTRIBUTED SYSTEMS Series Editor: Series Advisers: David Hutchison, Lancaster University, Lancaster, UK Serge Fdida, Université Pierre et Marie Curie, Paris, France Joe Sventek, University of Glasgow, Glasgow, UK The Wiley Series in Communications Networking & Distributed Systems is a series of expert-level, technically detailed books covering cutting-edge research, and brand new developments as well as tutorial-style treatments in networking, middleware and software technologies for communications and distributed systems. The books will provide timely and reliable information about the state-of-the-art to researchers, advanced students and development engineers in the Telecommunications and the Computing sectors. Other titles in the series: Wright: Voice over Packet Networks (February 2001) Jepsen: Java for Telecommunications (July 2001) Sutton: Secure Communications (December 2001) Stajano: Security for Ubiquitous Computing (February 2002) Martin-Flatin: Web-Based Management of IP Networks and Systems, (September 2002) Berman, Fox, Hey: Grid Computing. Making the Global Infrastructure a Reality, (March 2003) Turner, Magill, Marples: Service Provision. Technologies for Next Generation Communications (April 2004) Welzl: Network Congestion Control: Managing Internet Traffic X (July 2005) Raz, Juhola, Serrat-Fernandez, Galis: Fast and Efficient Context-Aware Services X (April 2006) Heckmann: The Competitive Internet Service Provider (April 2006) Dressler: Self-Organization in Sensor and Actor Networks (November 2007) Berndt: Towards 4G Technologies: Services with Initiative (March 2008)
5 SERVICE AUTOMATION AND DYNAMIC PROVISIONING TECHNIQUES IN IP/MPLS ENVIRONMENTS Christian Jacquenet, Gilles Bourdon and Mohamed Boucadair All at France Telecom, France
6 Copyright # 2008 John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England Telephone (þ44) (for orders and customer service enquiries): [email protected] Visit our Home Page on All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except under the terms of the Copyright, Designs and Patents Act 1988 or under the terms of a licence issued by the Copyright Licensing Agency Ltd, 90 Tottenham Court Road, London W1T 4LP, UK, without the permission in writing of the Publisher. Requests to the Publisher should be addressed to the Permissions Department, John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England, or ed to [email protected], or faxed to (þ44) Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners. The Publisher is not associated with any product or vendor mentioned in this book. All trademarks referred to in the text of this publication are the property of their respective owners. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold on the understanding that the Publisher is not engaged in rendering professional services. If professional advice or other expert assistance is required, the services of a competent professional should be sought. Other Wiley Editorial Offices John Wiley & Sons Inc., 111 River Street, Hoboken, NJ 07030, USA Jossey-Bass, 989 Market Street, San Francisco, CA , USA Wiley-VCH Verlag GmbH, Boschstr. 12, D Weinheim, Germany John Wiley & Sons Australia Ltd, 42 McDougall Street, Milton, Queensland 4064, Australia John Wiley & Sons (Asia) Pte Ltd, 2 Clementi Loop #02-01, Jin Xing Distripark, Singapore John Wiley & Sons Canada Ltd, 6045 Freemont Blvd, Mississauga, ONT, L5R 4J3, Canada Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. Library of Congress Cataloging-in-Publication Data Jacquenet, Christian. Service automation and dynamic provisioning techniques in IP/MPLS environments / Christian Jacquenet, Gilles Bourdon and Mohamed Boucadair. p. cm. Includes index. ISBN (cloth : alk. paper) 1. MPLS standard. 2. TCP/IP (Computer network protocol) I. Bourdon, Gilles. II. BoucadaIr, Mohamed. III. Title. TK J dc British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library ISBN (HB) Typeset in 10/12 pt Times by Thomson Digital, India. Printed and bound in Great Britain by Antony Rowe Ltd, Chippenham, England. This book is printed on acid-free paper.
7 Contents Preface Acknowledgements xi xiii PART I ARCHITECTURES AND PROTOCOLS FOR SERVICE AUTOMATION 1 1 Introduction To Begin With On IP Networks in General, and Routers in Particular On the Usefulness of Dynamic Routing Protocols in IP Networks On the Inability of an IGP to Address Interdomain Communication Needs On the BGP-4 Protocol The Rise of MPLS Context and Motivation of this Book Classifying Capabilities Services and Policies The Need for Automation How this Book is Organized What Is and What Should Never Be 16 References 16 2 Basic Concepts What is a Policy? Deriving Policies into Rules and Configuration Tasks Instantiation Device Identification Translation Storing Policies Policy and Device Configuration Policy-based Management Model Reaching a Policy Decision Requirements for a PEP PDP Communication Protocol 24 References 25
8 vi Contents 3 The RADIUS Protocol and its Extensions Protocol Design Protocol Structure and Messages Forces and Weaknessess Authorization and Provisioning with RADIUS Radius Extensions EAP Support with RADIUS Interim Accounting Dynamic Authorization Using RADIUS for Assignment, Prioritization and Filtering with VLANs Filtering IP Traffic Future Extensions RADIUS and its Future 55 References 59 4 The Diameter Protocol Learning from RADIUS Deficiencies General Requirements Authentication Requirements Authorization Requirements Accounting Requirements Diameter is Born Diameter: Main Characteristics Diameter Network Entities Diameter Applications Sessions and Connections Diameter Routing Peer Discovery Peer Connection Maintenance for Reliable Transmissions Protocol Details Diameter Header AVP Format Command Codes Accounting Diameter Network Access Application (NASREQ) AVP Usage for NASREQ Enhanced Authorization Parameters Enhanced Authorization Examples Diameter Credit Control Application Diameter in NGN/IMS Architecture for QoS Control What is an NGN? QoS Control in ETSI/TISPAN Architecture 85 References 90
9 Contents vii 5 The Common Open Policy Service (COPS) Protocol A New Scheme for Policy-based Admission Control A Client Server Architecture The COPS Protocol The COPS Header The COPS Message Objects COPS Messages Client-Open (OPN) Client-Accept (CAT) Request (REQ) Decision (DEC) Other COPS Messages Summary of COPS Operations Use of COPS in Outsourcing Mode Use of COPS in Provisioning Mode On the Impact of Provisioning Mode on COPS Operations On the Impact of Provisioning Mode on PEP PDP Exchanges Security of COPS Messages 104 References The NETCONF Protocol NETCONF at a Glance Introduction Motivations for Introducing NETCONF NETCONF, an IETF Initiative Missions of the IETF NETCONF Working Group NETCONF-related Literature What is In? What is Out? NETCONF Protocol Overview Some Words about XML NETCONF Terminology NETCONF Layer Model NETCONF Communication Phases NETCONF Data NETCONF Capability Exchange RPC Layer NETCONF Filtering NETCONF Protocol Operations Retrieve Configuration Data Get Delete Configuration Data Copy Configuration Edit Configuration Data Close a NETCONF Session Kill a Session 143
10 viii Contents Lock NETCONF Sessions Unlock NETCONF Sessions Validate Configuration Data Commit Configuration Changes Discard Changes of Configuration Data NETCONF Notification Procedure NETCONF Transport Protocol NETCONF as Transport-independent Protocol Transport Protocol Alternatives NETCONF Capabilities URL Capability XPath Capability Writable-Running Capability Candidate Configuration Capability Confirmed Commit Capability Validate Capability Distinct Startup Capability Rollback on Error Capability Notification Capability Configuring a Network Device NETCONF Content Layer 173 References Control and Provisioning of Wireless Access Points (CAPWAP) CAPWAP to Address Access Point Provisioning Challenges CAPWAP Concepts and Terminology Objectives: What do we Expect from CAPWAP? CAPWAP Candidate Protocols The CAPWAP Protocol CAPWAP Future 186 References 186 PART II APPLICATION EXAMPLES OF SERVICE AUTOMATION AND DYNAMIC RESOURCE PROVISIONING TECHNIQUES Dynamic Enforcement of QoS Policies Introduction What is Quality of Service, Anyway? The Need for Service Level Specifications An Example Enforcing QoS Policies in Heterogeneous Environments SLS-inferred QoS Policy Enforcement Schemes Policy Rules for Configuring DiffServ Elements 197 References 198
11 Contents ix 9 Dynamic Enforcement of IP Traffic Engineering Policies Introduction Terminology Considerations Reference Model COPS Message Content Request Messages (REQ) Decision Messages (DEC) Report Messages (RPT) COPS-PR Usage of the IP TE Client-Type Scalability Considerations A Tentative Metric Taxonomy Reporting the Enforcement of IP Traffic Engineering Policy IP TE PIB Overview COPS Usage for IP TE Accounting Purposes 207 References Automated Production of BGP/MPLS-based VPN Networks Introduction Approach Use of Policies to Define Rules Instantiation of IP VPN Information Model Classes Policy Components of an IP VPN Information Model Physical Components of an IP VPN Information Model Virtual Components of an IP VPN Information Model Inheritance Hierarchy Dynamic Production of IP VPN Services Context of a Multidomain Environment A Bit of Terminology Reference Model Possible Extensions of the VPN Model 224 References Dynamic Enforcement of Security Policies in IP/MPLS Environments Enforcing Security Policies for Web-based Access Control Enforcing Security Policies in Companies with 802.1X 235 References Future Challenges Introduction Current Issues with Configuration Procedures Towards Service-driven Configuration Policies Towards the Standardization of Dynamic Service Subscription and Negotiation Techniques Basic Motivation Commercial Framework A Service-oriented Architecture 242
12 x Contents Publishing and Accessing Services Example of Automated IP VPN Service Composition Introducing Self-organizing Networks What is a Self-organizing Network? Characteristics of SON Networks and Devices On Self-management SON Algorithms and How to Use Them for Enhancing Dynamic Policy Enforcement Schemes SON-inferred Business Opportunities 249 References 249 APPENDICES 251 Appendix 1 XML Schema for NETCONF RPCs and Operations 253 Appendix 2 XML Schema for NETCONF Notifications 269 Appendix 3 Example of an IP Traffic Engineering Policy Information Base (IP TE PIB) 273 Appendix 4 Example of an IP TE Accounting PIB 297 Appendix 5 Description of Classes of an IP VPN Information Model 311 A5.1 Introduction 311 A5.2 Policy Class Definitions 311 Index 329
13 Preface Just remember the set of services offered by the Internet a few years ago s, web services, sometimes experimental voice services, over what used to be referred to as a highspeed connection of a few hundred kbits/second! The Internet has gone through a profound transformation and has been evolving at an unprecedented rate compared with other industries, thus becoming the central component of all forms of communication: data ( s, web services, search engines, peer-to-peer, e-commerce, stock trading, etc.), voice but also video (TV broadcasting, videoconferencing). New innovative applications and services will undoubtedly continue to emerge, and we are still at an early stage of what the Internet will be able to provide in the near future. With no doubt, the impact of the Internet on how people communicate around the world and access to information will continue to increase rapidly. New forms of communication will arise such as tele-presence, ubiquitous services and distributed gaming, and the Internet will ineluctably extend its reach to objects, which is sometimes referred to the Internet of things, with billions of objects interconnected with each other and new forms of machineto-machine communication. This new era of services will lead to endless possibilities and opportunities in a variety of domains. The offering of a wide range of new services has required the design of networking technologies in the form of sophisticated protocols and mechanisms based on open standards driven by the Internet Engineering Task Force (IETF). The non-proprietary nature of the Internet Protocol (IP) led to interoperable solutions, thus making the Internet a unique platform of innovation. As a direct implication of the Internet becoming critical to our personal and professional lives, user expectation has become very high in terms of reliability, quality of service (QoS) and security. A network failure of a few minutes is now considered as unacceptable! Fast network failure detection and traffic reroute mechanisms have been designed to find alternate paths in the network within the timeframe of a few milliseconds while maintaining path quality. Fine granularity in terms of QoS is now a must: although some applications are inherently delay tolerant (e.g. asynchronous communications such as s), other traffic types impose bounded delays, jitters and reliability constraints that require complex configuration tasks to engineer the network. QoS guarantees imply traffic classification at the edge of the network, sophisticated local forwarding techniques (multipriority scheduling and traffic discard) and traffic engineering. The ability to effectively engineer the traffic within the network is now of the utmost importance and is known as a fairly difficult task for service providers considering the high
14 xii Preface volume of varying traffic. Furthermore, service providers have to engineer the network carefully in order to meet the quality of services imposed by demanding applications while having to deal with resource constraints. Security has become a central component: user identification and authentication and protection against attacks of different forms, including denial of service (DoS) attacks, require the configuration of complex networking technologies. Last but not least, the ability to efficiently manage and monitor the network is an absolute requirement to check service level agreements, enforce policies, detect network faults and perform network troubleshooting to increase the network availability. A considerable amount of attention has been paid to service automation, network provisioning and policy enforcement. Network technology designers have been actively working on various tools to effectively provision, configure and monitor the network with sophisticated network components so as to ensure the toll quality that the Internet is now delivering, far from the best effort service of the early days of the Internet. These tasks are increasingly crucial and complex, considering the diversity of the set of services provided by the Internet and the scale at which such tasks must be performed, with hundreds of millions of end-users, hundreds of services and a very significant traffic growth. This is the right book at the right time, and the authors are known for their deep level of expertise in this domain. The organization of the book is particularly well suited to the topic. The first part examines the protocols and architecture required for network provisioning and policy enforcement in IP/MPLS networks. However, a book on this key subject would not be thorough without a strong emphasis on issues of a practical nature, and this is what the second part of the book is about. A number of highly relevant examples are provided on QoS, traffic engineering and virtual private networks, ideally complementing the theory expounded in the first part of the book. JP Vasseur Cisco Distinguished Engineer Chair of the IETF Path Computation Element Working Group
15 Acknowledgements Christian Gilles Mohamed To my wife Béatrice and my sons Pierre and Paul, with all my love To my wife and my son To my parents and my wife, with all my love
International Marketing Research
International Marketing Research Third edition C. SAMUEL CRAIG and SUSAN P. DOUGLAS Leonard N. Stern School of Business, New York University Allie International Marketing Research Third edition Allie International
AN INTRODUCTION TO OPTIONS TRADING. Frans de Weert
AN INTRODUCTION TO OPTIONS TRADING Frans de Weert AN INTRODUCTION TO OPTIONS TRADING The Securities & Investment Institute Mission Statement: To set standards of professional excellence and integrity
Strategic Asset Allocation in Fixed-Income Markets
Strategic Asset Allocation in Fixed-Income Markets A MATLAB-Based User s Guide Ken Nyholm An extremely useful book for anyone interested in actually applying MATLAB based computational techniques to fixed-income
Designing and Developing Scalable IP Networks
Designing and Developing Scalable IP Networks Guy Davies Telindus, UK John Wiley & Sons, Ltd Contents List of Figures List of Tables About the Author Acknowledgements Abbreviations Introduction xi xiii
The need for bandwidth management and QoS control when using public or shared networks for disaster relief work
International Telecommunication Union The need for bandwidth management and QoS control when using public or shared networks for disaster relief work Stephen Fazio Chief, Global Telecommunications Officer
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks
Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks Mehdi Mani Wireless Networks and Multimedia Service Department GET-INT Evry, France [email protected] Noel Crespi Wireless
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations
Using & Offering Wholesale Ethernet Network and Operational Considerations
White Paper Using and Offering Wholesale Ethernet Using & Offering Wholesale Ethernet Network and Operational Considerations Introduction Business services customers are continuing to migrate to Carrier
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream
COPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments
Contents Foreword Preface Acknowledgments 1 Introduction 1 1.1 Motivation for Network Convergence 1 1.2 The Core Network 2 1.3 Legacy Service Requirements 4 1.4 New Service Requirements 5 1.5 Architectures
Automated Firewall Analytics
Automated Firewall Analytics Ehab Al-Shaer Automated Firewall Analytics Design, Configuration and Optimization 123 Ehab Al-Shaer University of North Carolina Charlotte Charlotte, NC, USA ISBN 978-3-319-10370-9
Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&
Building VPNs With IPSec and MPLS Nam-Kee Tan CCIE #4307 S& -.jr."..- i McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto
Software-Defined Networking: A Service Provider s Perspective draft-sin-sdnrg-sdn-approach
Software-Defined Networking: A Service Provider s Perspective draft-sin-sdnrg-sdn-approach M. Boucadair ([email protected]) C. Jacquenet ([email protected]) Slide #1 IETF 87 July
Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
How To Pass The Information And Network Security Certificate
Information Technology Information and Network Security Certificate Program Information and Network Security Certificate Program The Information and Network Security Certificate Program helps industry
IP, Ethernet and MPLS
IP, Ethernet and MPLS Networks Resource and Fault Management Andre Perez ISTE WILEY Table of Contents Preface xi Chapter 1. Network Operation 1 1.1. Basic concepts 1 1.1.1. Layered structure 1 1.1.2. LANs
Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications
Best Effort gets Better with MPLS Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications A White Paper on Multiprotocol Label Switching October,
Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov [email protected]
Management of Telecommunication Networks Prof. Dr. Aleksandar Tsenov [email protected] Part 1 Quality of Services I QoS Definition ISO 9000 defines quality as the degree to which a set of inherent characteristics
QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
Fundamentals of Mobile and Pervasive Computing
Fundamentals of Mobile and Pervasive Computing Frank Adelstein Sandeep K. S. Gupta Golden G. Richard III Loren Schwiebert Technische Universitat Darmstadt FACHBEREICH INFORMATIK B1BLIOTHEK Inventar-Nr.:
Fostering IoT Deployment Challenges and Assets of SDN Techniques
Fostering IoT Deployment Challenges and Assets of SDN Techniques C. Jacquenet [email protected] Slide 1 Outline Context On IoT networking, routing and service design Additional IoT challenges
Corporate Network Services of Tomorrow Business-Aware VPNs
Corporate Network Services of Tomorrow Business-Aware VPNs Authors: Daniel Kofman, CTO and Yuri Gittik, CSO Content Content...1 Introduction...2 Serving Business Customers: New VPN Requirements... 2 Evolution
Policy Based Network Management of a Differentiated Services domain using the Common Open Policy Service protocol
Policy Based Network Management of a Differentiated Services domain using the Common Open Policy Service protocol Adam Burke, Neco Ventura Department of Electrical Engineering, University of Cape Town,
WAN and VPN Solutions:
WAN and VPN Solutions: Choosing the Best Type for Your Organization xo.com WAN and VPN Solutions: Choosing the Best Type for Your Organization WAN and VPN Solutions: Choosing the Best Type for Your Organization
MPLS: Key Factors to Consider When Selecting Your MPLS Provider
White paper MPLS: Key Factors to Consider When Selecting Your MPLS Provider New Edge Networks June 2008 New Edge Networks 3000 Columbia House Blvd. Vancouver, WA 98661 360-693-9009 1-866-636-EDGE www.newedgenetworks.com
Preparing Your IP Network for High Definition Video Conferencing
WHITE PAPER Preparing Your IP Network for High Definition Video Conferencing Contents Overview...3 Video Conferencing Bandwidth Demand...3 Bandwidth and QoS...3 Bridge (MCU) Bandwidth Demand...4 Available
Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping
Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Executive Summary As organizations
Optimizing Performance for Voice over IP and UDP Traffic
A Riverbed Technology White Paper OPTIMIZING PERFORMANCE FOR VOICE OVER IP AND UDP TRAFFIC Optimizing Performance for Voice over IP and UDP Traffic 2006 Riverbed Technology, Inc. All rights reserved. 0
SDN, a New Definition of Next-Generation Campus Network
SDN, a New Definition of Next-Generation Campus Network Contents Campus Evolution and Development Trends... 1 Three Changes to Drive the Campus Network Development... 2 Fundamental Changes in User Behaviors...2
The changing face of global data network traffic
The changing face of global data network traffic Around the turn of the 21st century, MPLS very rapidly became the networking protocol of choice for large national and international institutions. This
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...
Enhanced Enterprise SIP Communication Solutions
Enhanced Enterprise SIP Communication Solutions with Avaya Aura and Allstream SIP Trunking An Allstream White Paper 1 Table Of Contents Beyond VoIP 1 SIP Trunking delivers even more benefits 1 Choosing
Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES
Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 SDN - An Overview... 2 SDN: Solution Layers and its Key Requirements to be validated...
Table of Contents. Introduction
viii Table of Contents Introduction xvii Chapter 1 All About the Cisco Certified Security Professional 3 How This Book Can Help You Pass the CCSP Cisco Secure VPN Exam 5 Overview of CCSP Certification
Integration with IP Phones
Copyright 2010 Sophos Limited. All rights reserved. No part of this publication may be reproduced, stored in retrieval system, or transmitted, in any form or by any means electronic, mechanical, photocopying,
Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN
Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN Product Overview Today s networked applications such as voice and video are accelerating the need
Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems
Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex
Analysis of IP Network for different Quality of Service
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith
Voice Over IP Performance Assurance
Voice Over IP Performance Assurance Transforming the WAN into a voice-friendly using Exinda WAN OP 2.0 Integrated Performance Assurance Platform Document version 2.0 Voice over IP Performance Assurance
Huawei esight Brief Product Brochure
Huawei esight Brief Product Brochure esight Integrated Enterprise NMS As the network scales and the number of enterprise network applications continue to grow, so does the number of devices, such as multi-service
Course Description. Students Will Learn
Course Description The next generation of telecommunications networks will deliver broadband data and multimedia services to users. The Ethernet interface is becoming the interface of preference for user
Service Assurance Tools
Managing MPLS with Service Assurance Tools Whitepaper Prepared by www.infosim.net August 2006 Abstract MPLS provides the foundation for the offering of next-generation services and applications such as
November 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
MOBILE VIDEO WITH MOBILE IPv6
MOBILE VIDEO WITH MOBILE IPv6 DANIEL MINOLI WILEY A JOHN WILEY & SONS, INC., PUBLICATION CONTENTS PREFACE ABOUT THE AUTHOR xi xiii 1 THE MOBILE USER ENVIRONMENT: SMART PHONES, PORTABLE MEDIA PLAYERS (PMPs),
The Data Access Handbook
The Data Access Handbook Achieving Optimal Database Application Performance and Scalability John Goodson and Robert A. Steward PRENTICE HALL Upper Saddle River, NJ Boston Indianapolis San Francisco New
A Study of Network Security Systems
A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya
PSTN IXC PSTN LEC PSTN LEC STP STP. Class 4. Class 4 SCP SCP STP. Switch. Switch STP. Signaling Media. Class 5. Class 5. Switch.
As we enter the 21st century, we are experiencing a telecommunications revolution. From a technological perspective, the distinction between voice information and other kinds of data is blurring as circuit-switched
MENTER Overview. Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001
MENTER Overview Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001 MENTER Goal MPLS Event Notification Traffic Engineering and Restoration Develop an
ITL BULLETIN FOR JANUARY 2011
ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division
Contents. Biography. Acknowledgments. List of Abbreviations. List of Symbols
Contents Biography Preface Acknowledgments List of Abbreviations List of Symbols xi xiii xvii xix xxvii 1 Introduction 1 1.1 Cellular Mobile Communication Systems 1 1.1.1 The Cellular Concept 2 1.1.2 Propagation
Voice over IP is Transforming Business Communications
White Paper Voice over IP is Transforming Business Communications Voice over IP (VoIP) is changing the world of telecommunications. It entails the transmission of voice calls over data networks that support
Convergence: The Foundation for Unified Communications
Convergence: The Foundation for Unified Communications Authored by: Anthony Cimorelli, Senior Product Marketing Manager Onofrio Norm Schillaci, Principal Sales Engineer Michelle Soltesz, Director, Marketing
Secure VoIP for optimal business communication
White Paper Secure VoIP for optimal business communication Learn how to create a secure environment for real-time audio, video and data communication over IP based networks. Andreas Åsander Manager, Product
VoIP / SIP Planning and Disclosure
VoIP / SIP Planning and Disclosure Voice over internet protocol (VoIP) and session initiation protocol (SIP) technologies are the telecommunication industry s leading commodity due to its cost savings
Constructing High Quality IP Core Network
Constructing High Quality IP Core Network What we need is not only a network, but also the services that network can provide. ---------Huawei-3Com Constructing networks is much like building bridges or
Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time
Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
UK Interconnect White Paper
UK Interconnect White Paper 460 Management Management Management Management 460 Management Management Management Management AI073 AI067 UK Interconnect White Paper Introduction The UK will probably have
Application Note. Pre-Deployment and Network Readiness Assessment Is Essential. Types of VoIP Performance Problems. Contents
Title Six Steps To Getting Your Network Ready For Voice Over IP Date January 2005 Overview This provides enterprise network managers with a six step methodology, including predeployment testing and network
GR2000: a Gigabit Router for a Guaranteed Network
Hitachi Review Vol. 48 (1999), No. 4 203 GR2000: a Gigabit Router for a Guaranteed Network Kazuo Sugai Yoshihito Sako Takeshi Aimoto OVERVIEW: Driven by the progress of the information society, corporate
Contents. Foreword. Acknowledgments
Foreword Preface Acknowledgments xv xvii xviii CHAPTER 1 Introduction 1 1.1 What Is Mission Critical? 1 1.2 Purpose of the Book 2 1.3 Network Continuity Versus Disaster Recovery 2 1.4 The Case for Mission-Critical
Quality of Service for IP Videoconferencing Engineering White Paper
Engineering White Paper Subha Dhesikan Cisco Systems June 1 st, 2001 Copyright 2002 Cisco Systems, Inc. Table of Contents 1 INTRODUCTION 4 2 WHY QOS? 4 3 QOS PRIMITIVES 5 4 QOS ARCHITECTURES 7 4.1 DIFFERENTIATED
RSVP- A Fault Tolerant Mechanism in MPLS Networks
RSVP- A Fault Tolerant Mechanism in MPLS Networks S.Ravi Kumar, M.Tech(NN) Assistant Professor Gokul Institute of Technology And Sciences Piridi, Bobbili, Vizianagaram, Andhrapradesh. Abstract: The data
Voice, Video and Data Convergence > A best-practice approach for transitioning your network infrastructure. White Paper
> A best-practice approach for transitioning your network infrastructure White Paper The business benefits of network convergence are clear: fast, dependable, real-time communication, unprecedented information
LTE Congestion Management. Enabling Innovation and Improving the Consumer Experience
LTE Congestion Management Enabling Innovation and Improving the Consumer Experience January 2015 Copyright 2015 Rysavy Research, LLC. All rights reserved. http://www.rysavy.com Table of Contents NOTICE...
ICTTEN4215A Install and configure internet protocol TV in a service provider network
ICTTEN4215A Install and configure internet protocol TV in a service provider network Release: 1 ICTTEN4215A Install and configure internet protocol TV in a service provider network Modification History
OSS for Telecom Networks
Kundan Misra OSS for Telecom Networks An Introduction to Network Management Springer Preface Acknowledgements v vii 1 Introduction 1 1.1 End-to-end Management and Unified Management 2 1.2 Standardisation
Ukulele In A Day. by Alistair Wood FOR. A John Wiley and Sons, Ltd, Publication
Ukulele In A Day FOR DUMmIES by Alistair Wood A John Wiley and Sons, Ltd, Publication Ukulele In A Day For Dummies Published by John Wiley & Sons, Ltd The Atrium Southern Gate Chichester West Sussex PO19
VoIP versus VoMPLS Performance Evaluation
www.ijcsi.org 194 VoIP versus VoMPLS Performance Evaluation M. Abdel-Azim 1, M.M.Awad 2 and H.A.Sakr 3 1 ' ECE Department, Mansoura University, Mansoura, Egypt 2 ' SCADA and Telecom General Manager, GASCO,
Extreme Networks CoreFlow2 Technology TECHNOLOGY STRATEGY BRIEF
Extreme Networks CoreFlow2 Technology TECHNOLOGY STRATEGY BRIEF TECHNOLOGY STRATEGY BRIEF Extreme Networks CoreFlow2 Technology Benefits INCREASED VISIBILITY Detailed monitoring of applications, their
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
WHITE PAPER Converged Business Networks: Simplifying Network Complexity Sponsored by: Level 3 Melanie Posey November 2010 Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015
Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications
Draft ITU-T Recommendation X.805 (Formerly X.css), architecture for systems providing end-to-end communications Summary This Recommendation defines the general security-related architectural elements that
RIVERBED STEELCENTRAL NETPLANNER
RIVERBED STEELCENTRAL NETPLANNER TESTIMONIALS IT Guru NetPlanner avoided the downtime of our critical applications by designing the network with resiliency to outages. Senior Network Architect Financial
Telepresence in an IPv6 World. Simplify the Transition
Telepresence in an IPv6 World Simplify the Transition IPV6 has the potential to transform communications, collaboration, learning, entertainment, physical security and more. What You Will Learn If you
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
SIP Trunking. Cisco Press. Christina Hattingh Darryl Sladden ATM Zakaria Swapan. 800 East 96th Street Indianapolis, IN 46240
SIP Trunking Christina Hattingh Darryl Sladden ATM Zakaria Swapan Cisco Press 800 East 96th Street Indianapolis, IN 46240 SIP Trunking Contents Introduction xix Part I: From TDM Trunking to SIP Trunking
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL
SIP Proxy. SIP Proxy. Bicom SYSTEMS. SIP Proxy... Advanced Simplicity
Session border controller solution offering high performance, security and SIP compliance connectivity. 1 DIAGRAM : Registration SIP Client registration for all users (, Business, Hosted PBXware and Wholesale)
Classic Grid Architecture
Peer-to to-peer Grids Classic Grid Architecture Resources Database Database Netsolve Collaboration Composition Content Access Computing Security Middle Tier Brokers Service Providers Middle Tier becomes
Unifying the Distributed Enterprise with MPLS Mesh
Unifying the Distributed Enterprise with MPLS Mesh Technical Whitepaper June 2011 Copyright 2011 AireSpring Introduction Today s modern enterprise employs IT technologies that deliver higher value, resiliency,
MPLS Quality of Service What Is It? Carsten Rossenhövel EANTC (European Advanced Networking Test Center)
MPLS Quality of Service What Is It? Carsten Rossenhövel EANTC (European Advanced Networking Test Center) About EANTC EANTC offers vendor independent network quality assurance since 1991 EANTC Berlin -
How To Manage A Network Management System (Hitachi)
Hitachi Review Vol. 51 (2002), No. 2 65 Integrated Management System Job Management Partner 1 (JP1), Version6i for Broadband Networks Yoshiyuki Kurosaki Toshio Sato Kiminori Sugauchi Tokuji Tamada OVERVIEW:
IP videoconferencing solution with ProCurve switches and Tandberg terminals
An HP ProCurve Networking Application Note IP videoconferencing solution with ProCurve switches and Tandberg terminals Contents 1. Introduction... 3 2. Architecture... 3 3. Videoconferencing traffic and
IT 3202 Internet Working (New)
[All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any
The Complete IS-IS Routing Protocol
Hannes Gredler and Walter Goralski The Complete IS-IS Routing Protocol 4y Springer Contents Foreword Credits and Thanks vii ix 1 Introduction, Motivation and Historical Background 1 1.1 Motivation 1 1.2
WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter
WHITEPAPER VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter The Holy Grail: Achieving Simplicity and Control in the IT Infrastructure Today s Information Technology decision-makers
LIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
MPLS/IP VPN Services Market Update, 2014. United States
MPLS/IP VPN Services Market Update, 2014 United States August 2014 Contents Section Slide Numbers Executive Summary 4 Market Overview & Definitions 8 Drivers & Restraints 14 Market Trends & Revenue Forecasts
SECURITY AND QUALITY OF SERVICE IN AD HOC WIRELESS NETWORKS
SECURITY AND QUALITY OF SERVICE IN AD HOC WIRELESS NETWORKS Ensuring secure transmission and good quality of service (QoS) are key commercial concerns in ad hoc wireless networks as their application in
Versalar Switch Router 15000. Market Opportunity and Product Overview
Versalar Switch Router 15000 Market Opportunity and Product Overview Services Driven Market Value-added services ($15B) e-commerce, IP Telephony, IP Fax, Security services, VPN, customer care, flexible
